Chapter 15 - Not Edited: Eyes Wide Shut: An Enigma

Fiction: Based Upon Actual Events

Source

Chapter 15 - Draft

Hacked Daemon's Computer

Back at work, Curtis was talking to his 3D quantum computer, developing parameters to research possible frequencies, the power required and the viability of the concept. Daemon had dropped in for coffee and left saying it was going to be a very busy day in his other job.

Suddenly, JR’s was standing, looking like he had just won the Nobel Peace Prize, in the 3D hologram. He was in the computer. JR said, “I bet you’re glad to see me.” Curtis was speechless. Where was Daemon? How did JR hack into the “hack-proof” computer and network? Would Daemon know? JR with a wide grin replied, “OK, OK, take a deep breath, I will answer.”

“Daemon is off-site. He is not monitoring us. He is comfortable with you here. He worries when you are not. Daemon will not know that I hacked his network.” Curtis, laughing said, “You know where the word, ‘hacking’ came from? It is from a German word meaning, ‘someone who makes furniture with an ax.’”

JR, proud of his accomplishment, gave a long answer to explain how he hacked Daemon’s network.

JR said, “In a penetration test on Daemon’s network, he used a Skystar 2 PCI satellite receiver card, a piece of hardware that can be purchased on eBay for $40 or less, along with open source Linux DVB software applications and the network data analysis or "sniffing" tool Tool shark. Exploiting that signal, JR says he was able to connect to the Internet via satellite, creating a high-speed, untraceable anonymous Internet connection.”

JR explained, “He also reversed the trick, impersonating Daemon’s Web sites. He intercepted a Domain Name System (DNS) request, also known as a request for an Internet service provider (ISP) to convert a spelled out Web site name into the numerical IP address where it's stored. Curtis interrupted, Simple idea, continue with you explanation. JR, with an air of pride, continued, “Then it sends back an answer faster than the ISP. This allows him to replace a Web site that Daemon requested and goes to a site of his choosing. He was also able to hijack signals using GRE or TCP protocols, all undetectable. Satellite hacking is a facet of my many tools in my black box.”

Curtis, walking toward the 3D hologram figure of JR, asks, “How did you decrypt Daemon’s files? Everyone knows quantum-computing codes are unbreakable. It provides near-invulnerable encryption that cannot be eavesdropped upon. The encryption keys are sent via a pattern of single polarized photons and can be changed 100 times per second.

The method is also spy proof, since any third-party observation of the photons changes their properties - laws of quantum physics – the act of observing changes the observed.”

JR, beaming, replies, “Quantum cryptography and quantum information science uses the unit. Unlike conventional computers that uses a bit. Quantum computers use a quantum bit – qubit. A qubit may not only be zero or one, but also zero and one simultaneously. I used photons as a physical representation of qubits.

Curtis interrupts, “I know quantum cryptography is a method of secure communication using qubits. Such communication is based on the Heisenberg uncertainty principle. If an eavesdropper listens to qubits, they change them, which are inevitably noticed by the legitimate users. That is, any attempt of eavesdropping will be caught (in theory). This principle would indicate that it would be impossible to decrypt.”

JR drawled, he was enjoying this, “Curtis you have not been doing your homework. My task was to make sure I duplicate the eavesdropping. I reviewed the implementations of quantum cryptography. You must fight fire with fire. Since observation alters the state. I set up an observation. I duplicated what Daemon had done. . It is not perfect, but it works…so far.”

Curtis animated, asked, “Have you found out what Daemon has accomplished in his New World Order scheme?” JR replied, “He has not completely downloaded all of the information. He thinks he can have everything downloaded by this afternoon. He has discovered only ten humans have been altered. Also, he learned of the locations of Daemon’s spy bots, bug bots, and other communication connections.”

Curtis asked again, “How will I know if Daemon is watching me?” JR sitting down at a desk replies, “Quantum Entanglement. You remember quantum entanglement is a physical resource, like energy, associated with the peculiar non classical correlations that are possible between separated quantum systems. Entanglement can be measured, transformed, and purified. A pair of quantum systems in an entangled state can be used as a quantum information channel to perform computational and cryptographic tasks that are impossible for classical systems.”

“I will set-up a computer monitor that will notify you when you are being watched. I have a necklace with a medallion. Inside the medallion is a receiver. The passive receiver will be programmed to activate a solenoid that will send a sharp short needle into your chest. You will know when you are being watched.”

JR, waving his hand, says, “He has to go to complete the transfer of information.” JR disappeared. He was like Elvis: “He has left the room.”

Curtis, heart beating rapidly, began to pace in his office. Wow, this information would make a difference. Information is a tool, but the information Daemon has assembled was now Curtis’ knowledge. Now, he knew he could stop Daemon.

Comments

No HTML is allowed in comments, but URLs will be hyperlinked. Comments are not for promoting your articles or other sites.

sending

AUTHOR

Dallas W Thompson

8 years agofrom Bakersfield, CA

Enlydia Listener, you think that is why all three of my computers have "crashed?" I save multiple places... I appreciate the fact this is not "fiction..." It "ain't" for the faint-of-heart..."

Enlydia Listener

8 years agofrom trailer in the country

Dallas...I hope you don't mind, but I am going to be praying a special protection around you...you know you are being watched...Blessings.

AUTHOR

Dallas W Thompson

8 years agofrom Bakersfield, CA

Enlydia Listener, Yes, and more. Beyond your imagination... We (USA) are the best in the world in terms of breaking other peoples "code." The challenge is our own companies are at risk. You can right now hack into electrical power generating companies and shut down their facilities. Ditto electrical petrochemicals, gas plants. A "real world" demonstration was done at Livermore Labs with the company's consent. First, the automatic controls were disabled. Then the heaters were raised on the tanks... It was stopped before and danger was present. Control was from a distant computer... An example of our "Cyber weakness:" We have a secret plane that a foreign government has the plans and specifications and the plane has not even flown yet...

Enlydia Listener

8 years agofrom trailer in the country

Most of this is above me...do you think these concepts are possible in the "real" world?

AUTHOR

Dallas W Thompson

8 years agofrom Bakersfield, CA

Nellieanna, Your perception is correct ("... I perceive your tendency to do so")! Your comments are appreciated. We could talk for hours about them! Thanks!

Nellieanna Hay

8 years agofrom TEXAS

I've always thought we couldl pass through walls. Perpahs it's like the cleavage lines in the atoms of diamonds which must be lined up to cut correctly or else the diamond shatters. But in the case of our cleavage lines for going through solid walls, when not lined up, they resist. If they did line up - we'd smoothe right on through 'em. Atoms have no "skin", do they? They're simply a micro entitiy of interdependent bits of energy "charges".

I know - very primitive illustration. But it's what's rumbled around in my thinking and it still has some kind of plausiblility about it. Actually since nothing is actually "solid" - it's all rather elementary. The resistance to being permeable is surely a matter of forces and energies rather than any actual material blockage.

Oh dear. I hope you don't mind me. Actually if you're to be able to instruct me, you have to know both what I do know and what a vast amount I don't! LOL. (not that it's your job to do so, but I perceive your tendency to do so)

AUTHOR

Dallas W Thompson

8 years agofrom Bakersfield, CA

The part where I mentioned quantum computer code cannot be "broken," there are working models where you anticipate the variables (eg "viewing, environment & etc) and you CAN convert to "Plain-text."

Perhaps an example of "logic," would be given the actual scale of atomic structure..we are mostly empty space...tell that to your finger when you have hit something..! We should be able to pass thru walls...

Nellieanna Hay

8 years agofrom TEXAS

It would surprise me if it "ACTED" like what we would consider "logical". Nothing in our logic to rely on as far as determining what the behavior of any of the building blocks of that which we can barely understand. It's weird but only because our perspective is limited and geared to serve its limited needs. Thanks for taking time to explain more of it. I "know" what I don't know in some sort of weird inexplicable ways I think - but I love to know more about what can be explained.

AUTHOR

Dallas W Thompson

8 years agofrom Bakersfield, CA

In my prior life I was a science instructor... The physics part is factual. Electrons are "guess-estimated" in terms of exactly where they are, or where they are not... If you try to "peek" at them.. They are shy and change. It defies logic... Yet science has begun to "manage" the improbable... Some particles appear from nowhere, only to disappear... I know it is weird..

Nellieanna Hay

8 years agofrom TEXAS

Yikes! This is mentally multi-dimensional even for a novive like I am! I love it. I must admit I was entranced by this sentence: "...any third-party observation of the photons changes their properties - laws of quantum physics – THE ACT OF OBSERVING CHANGES THE OBSERVED." Disappointed that it turned out to be the flaw in Daemon's setup. But it has such a human/subjective quality to it, to me - that I suppose it would be a flaw in a "perfect" plan! I love it anyway. It's ingenious!

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

This is used to display charts and graphs on articles and the author center. (Privacy Policy)

Google AdSense Host API

This service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)

This is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)

Facebook Login

You can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)

Maven

This supports the Maven widget and search functionality. (Privacy Policy)

We may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.

Conversion Tracking Pixels

We may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.

Statistics

Author Google Analytics

This is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)

Comscore

ComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)

Amazon Tracking Pixel

Some articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)